BBing

Terminal Sudoku game

I wrote this small game because when I was working on leetcode, I encountered 37. Solving the Sudoku problem, and after finishing it, I thought that it could be expanded into a small game. This article is transferred from https://imcbc.cn/202303/terminal-sudoku/ This site is only for collection, and the copyright belongs to the original author.

codebrowser bookmark plugin

When using codebrowser to check some source code, because there is no bookmark jump function, sometimes it is not very convenient to trace the call stack. Therefore, a grease monkey plug-in for codebrowser bookmark function has been developed. This article is transferred from https://imcbc.cn/202302/codebrowser-bookmark-script/ This site is only for collection, and the copyright belongs to …

codebrowser bookmark plugin Read More »

During my years at RoboMaster

Talking about sweeping robots, drones, and vision with friends last night, I remembered the RoboMaster competition I participated in when I was “young”, so I want to share my experience in that year. This article is transferred from https://imcbc.cn/202301/robomaster-experience/ This site is only for collection, and the copyright belongs to the original author.

glibc-read/write source code reading

The Linux file system can be divided into two layers, the virtual file system (VFS) and the driver. VFS is mainly connected with the driver to realize the adaptation and management of different file systems. The read/write function read in this article is at the VFS level, and the source code is as follows: https://codebrowser.dev/linux/linux/fs/read_write.c.html …

glibc-read/write source code reading Read More »

2022 Year-End Summary

This is the first time to write a year-end summary on a blog, which mainly focuses on the following aspects: work changes and feelings, ideas for changing cities, blog construction, technological growth, completion of this year’s plan, and rough plan for next year. This article is transferred from https://imcbc.cn/202212/2022-summary/ This site is only for collection, …

2022 Year-End Summary Read More »

OMV hardware and software upgrades

Previously, I used an old laptop to flash OMV to change a NAS, but it was always because of heat dissipation problems, so be careful of fire (in fact, the temperature has not been high). Therefore, I recently upgraded the software and hardware of the NAS at home. This article is transferred from https://imcbc.cn/202212/omv-update/ This …

OMV hardware and software upgrades Read More »

tagged-pointer – make the pointer contain more information

In C++, we can specify the alignment of a type in memory. For example, use __attribute__((aligned(4))) to align variables of this type with 4Byte. Generally, there are two main points to discuss the role of memory alignment: Cross-platform porting (related to hardware) Improve CPU access performance This article is transferred from https://imcbc.cn/202211/tagged-pointer/ This site is …

tagged-pointer – make the pointer contain more information Read More »

Some applications other than dotfiles

The core idea of ​​dotfiles I learned is: 1. Unify management of files under different paths through soft links; 2. Assign unified management files to different paths through soft links; Inspired by these two viewpoints, some applications can also be implemented through soft links in daily development/life. This article is transferred from https://imcbc.cn/202211/dotfiles-more/ This site …

Some applications other than dotfiles Read More »

file and folder md5 tool – md5any

In the past two days, I have been sorting out the github action of the blog, and I only expect to trigger build&deploy when there is a modification, but I encountered some problems in the practice process, so I wrote the md5any tool. This article is reprinted from https://bbing.com.cn/202210/md5fileandic-md5any/ This site is for inclusion only, …

file and folder md5 tool – md5any Read More »

Use GPG to prevent committer impersonation

On platforms such as Github/Gitlab, there is an option to add GPG keys. What is the use of GPG keys? For example, using GPG authentication can prevent committers from impersonating. This article is reproduced from https://bbing.com.cn/202209/gunpg-commiter-sign/ This site is for inclusion only, and the copyright belongs to the original author.

NAS-OMV container configuration

In “Idle Notebook Change NAS-omv Stepped Pit Record” , I briefly introduced why I changed the old notebook to NAS and the general operation. However, when I replaced the solid-state system and reinstalled the system recently, I found that the previous article could not be used, so it needs to be recorded in detail. The …

NAS-OMV container configuration Read More »